Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 12:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe
-
Size
321KB
-
MD5
6e7fbba1c37f67c3aa86227a41232816
-
SHA1
31bff2d2c62b5a1a5fe2e433aed6c98e07413c69
-
SHA256
dcbca156b01b4eba803996d45bd9b63df389e95cf98312af0711e61b0bca38d3
-
SHA512
00b58f9b7989de6e3acd504a049abe392c6c0ccb3f038e40551b5d4b58bb2477b3414de6c5524c1e0f90b9bb4c0abe9e649550b15e04e86fbea895337d69b43a
-
SSDEEP
6144:8kEQ9l9yOj4zdgXMz6rgx/ouyrRCwwHbKOQrPNf+iSQfflS15u:8+l9yC4RpzmqouydCw4v++YlS1s
Score
10/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\newage = "C:\\Users\\Admin\\AppData\\Roaming\\newage\\newage.exe" 6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1152 6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1152 6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe Token: 33 1152 6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1152 6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1152 6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6e7fbba1c37f67c3aa86227a41232816_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1152
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2972